www.businesswire.com Open in urlscan Pro
23.37.36.148  Public Scan

URL: https://www.businesswire.com/news/home/20231025780908/en/ThreatNG-Revolutionizes-Security-Assessment-with-Groundbreaking-Secu...
Submission: On November 24 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

Name: bw-search-formPOST /portal/site/home/template.SINGLEPORTLET/action.process/permalink/?javax.portlet.action=true&currentTemplateID=PAGE&javax.portlet.tpst=503a8767054f0df6a9e77a100d908a0c&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken

<form id="bw-search-form" name="bw-search-form"
  action="/portal/site/home/template.SINGLEPORTLET/action.process/permalink/?javax.portlet.action=true&amp;currentTemplateID=PAGE&amp;javax.portlet.tpst=503a8767054f0df6a9e77a100d908a0c&amp;javax.portlet.begCacheTok=com.vignette.cachetoken&amp;javax.portlet.endCacheTok=com.vignette.cachetoken"
  method="post">
  <fieldset>
    <div id="bw-search-options">
      <h3 id="bw-search-options-head" class="toggler hidden"><span>Search Options</span></h3>
      <div id="bw-search-filter-links" class="togglee">
        <ul>
          <li><a href="#?type=all" id="bw-search-filter-all" title="Search All" class="is-selected">Search All</a></li>
          <li><a href="#?type=news" id="bw-search-filter-news" title="Search News">Search News</a></li>
          <li><a href="#?type=site" id="bw-search-filter-site" title="Search Site">Search Site</a></li>
          <li>
            <a href="/portal/site/home/search?javax.portlet.tpst=503a8767054f0df6a9e77a100d908a0c&amp;javax.portlet.pbp_503a8767054f0df6a9e77a100d908a0c_view=advancedSearch&amp;javax.portlet.begCacheTok=com.vignette.cachetoken&amp;javax.portlet.endCacheTok=com.vignette.cachetoken" id="bw-search-filter-adv" title="Advanced News Search">Advanced News Search</a>
          </li>
        </ul>
      </div>
    </div>
    <label for="bw-search-input">Advanced News Search</label>
    <input type="search" id="bw-search-input" name="q" maxlength="256" value="" title="Search BusinessWire.com" placeholder="Search">
    <input type="hidden" id="bw-search-type" name="qSearchType" value="all">
    <button type="submit" class="bw-button-primary" id="bw-search-button" title="Search"><span><img src="/images/icons/icon_search.gif" alt="Search"></span></button>
  </fieldset>
</form>

Text Content

THREATNG REVOLUTIONIZES SECURITY ASSESSMENT WITH GROUNDBREAKING SECURITY AND
CYBERSECURITY RATINGS BACKED BY EXTERNAL ATTACK SURFACE AND DIGITAL RISK
INTELLIGENCE FOR UNMATCHED CLARITY AND VALIDITY IN SCORING

A New Approach in Cybersecurity Scoring: ThreatNG Security Ratings Redefines
Precision and Insight

October 25, 2023 10:10 AM Eastern Daylight Time

NEW YORK--(BUSINESS WIRE)--ThreatNG, a leading innovator in digital presence
security, threat, and risk solutions, is proud to announce the release of its
game-changing Security Ratings capability. This groundbreaking feature is
substantiated and proven with external attack surface and digital risk
intelligence, setting new industry standards for clarity, validity, and fidelity
in security scoring.

> “The ThreatNG Susceptibility and eXposure Security Ratings empower
> organizations with a consolidated and contextualized external view of their
> digital presence to allocate resources effectively, implement targeted
> security measures, enhance risk management, and ensure compliance, bolstering
> their cybersecurity posture and resilience”
> 
> Post this

Organizations require more robust and accurate external security assessments to
safeguard their digital assets effectively with the ever-evolving threat
landscape and the increasing complexity of cyberattacks. ThreatNG Security
Ratings addresses this critical need by providing in-depth insights into an
organization's security posture, backed by comprehensive external attack surface
analysis and digital risk intelligence.

Enhancing Security Ratings with Comprehensive External Intelligence

ThreatNG Security Ratings benefit from an array of investigation modules that
provide unparalleled clarity, validity, and fidelity to organizations worldwide.
These modules include Domain Intelligence, Social Media Monitoring, Sensitive
Code Exposure Detection, Search Engine Exploitation Alerts, Cloud and SaaS
Exposure Assessment, Online Sharing Exposure Evaluation, Sentiment and Financial
Analysis, Archived Web Page Scrutiny, Dark Web Presence Monitoring, and
Technology Stack Assessment. With Security Ratings backed by these investigation
modules, organizations can make informed decisions, prioritize security
measures, and fortify their defenses based on comprehensive and validated
intelligence. This comprehensive and validated intelligence allows organizations
to operate with the following essential qualities:

 * Clarity: Obtain a panoramic perspective of your security stance, integrating
   insights from diverse data sources to illuminate vulnerabilities.
   
 * Validity: Rely on rigorously verified information from an array of modules,
   cementing the precision of your security evaluations.
   
 * Fidelity: Delve into an in-depth and accurate analysis of your risk profile,
   surpassing traditional assessments to deliver a genuine portrayal of your
   organization's cybersecurity health

Extensive and In-Depth ThreatNG Susceptibility and eXposure Scoring

ThreatNG Susceptibility and eXposure scoring starts with the ThreatNG Exposure
Score, which is a comprehensive metric composed of the following individual
measures providing organizations with a holistic view of their cybersecurity
posture and its impact on various aspects of their operations:

 * Breach & Ransomware Susceptibility
   Evaluate the likelihood of a security breach or ransomware attack. This
   evaluation considers external attack surface and digital risk intelligence to
   gauge the organization's susceptibility to these critical threats. The
   percentage of organizations that have experienced a ransomware attack in the
   past year is 13% in 2022, up from 11% in 2021. [Verizon Data Breach
   Investigations Report 2023]
   

 * BEC & Phishing Susceptibility
   Measure an organization's susceptibility to Business Email Compromise (BEC)
   and phishing attacks. There were over 300,000 reported cases of BEC and
   phishing attacks in 2022, which is expected to increase to over 400,000 in
   2023. [FBI Internet Crime Complaint Center]
   

 * Data Leak Susceptibility
   Assess how prone the organization is to data leaks. Over 10 billion records
   were exposed in data leaks in 2022, which is expected to increase to over 12
   billion in 2023. [Ponemon Institute Cost of a Data Breach Report 2023]
   

 * Brand Damage Susceptibility
   Evaluate an organization's vulnerability to threats that could tarnish its
   brand reputation. The average cost of a brand damage incident in 2022 was
   $3.9 million, expected to increase to $4.2 million in 2023. [IBM Security
   Cost of a Data Breach Report 2023]
   

 * Web Application Hijack Susceptibility
   Evaluates the risk of hijacking, which can lead to unauthorized access or
   manipulation of web applications. Over 100,000 reported cases of web
   application hijacking attacks occurred in 2022, which is expected to increase
   to over 125,000 in 2023. [Verizon Data Breach Investigations Report 2023]
   

 * Subdomain Takeover Susceptibility
   Assess the risk of subdomain takeovers, where attackers can gain control over
   a subdomain. Thousands of reported subdomain takeover attacks continue to be
   reported yearly and are expected to increase in the upcoming months.
   

 * Cyber Risk Exposure
   Obtain an overall assessment of the organization's exposure to cyber risks.
   It combines various risk factors to gauge the organization's vulnerability to
   multiple threats. The global cost of cybercrime will reach $10.5 trillion by
   2025. [Cybersecurity Ventures]
   

 * Supply Chain & Third Party Exposure
   Measure the organization's exposure to risks associated with its supply chain
   and third-party relationships. Businesses are increasingly reliant on
   third-party vendors for critical services. This reliance on third-party
   vendors can make businesses vulnerable to cyberattacks if their vendors are
   not adequately secured.
   

 * ESG Exposure
   Environmental, Social, and Governance (ESG) Exposure assesses how
   cybersecurity practices align with ESG principles by reporting an
   organization’s documented violations. ESG violations affect susceptibility
   and exposure to cyber-attacks, digital risk levels, and security rating
   scores. For example, an organization engaged in environmental degradation
   could attract the attention of hacktivist groups who might attempt to
   compromise the company's digital assets to make a statement or disrupt
   operations.

The ThreatNG Exposure Score, along with these individual scores, provides a
comprehensive and multidimensional view of an organization's cybersecurity risk
landscape, enabling them to make informed decisions about all critical
functional assets and pillars:

 * Technical: Helps IT and security teams identify vulnerabilities and
   weaknesses, allowing them to prioritize and implement necessary security
   measures effectively.
   
 * Strategic: Informs strategic decision-making by highlighting potential risks
   and their impact on the organization's reputation, compliance, and long-term
   goals.
   
 * Operational: Facilitate streamlining operational processes by focusing on
   areas where security improvements are most needed, reducing the likelihood of
   disruptions and data breaches.
   
 * Financial: Quantifies cybersecurity risks, aiding financial teams in
   allocating resources for risk mitigation and potentially reducing financial
   losses associated with cyber incidents.

ThreatNG Security Ratings as a Comprehensive Cybersecurity Compass

“The ThreatNG Susceptibility and eXposure Security Ratings empower organizations
with a consolidated and contextualized external view of their digital presence
to allocate resources effectively, implement targeted security measures, enhance
risk management, and ensure compliance, bolstering their cybersecurity posture
and resilience,” says Eric Gonzales, Founder of ThreatNG. "For example, it can
identify data leak and breach risks, enabling proactive measures in cloud
environments; mitigate SaaS-based phishing and hijacking threats with targeted
defenses for SaaS security; strengthen data protection with insights into
vulnerabilities that could lead to breaches for data security; secure web
applications by addressing identified vulnerabilities for application security;
prioritize vendor assessments to mitigate supply chain risks for supply chain
security; enhance API security to safeguard critical application interfaces; and
align security practices with ESG principles for ethical and sustainable
cybersecurity."

Contact ThreatNG Security today for a Free 30-day Evaluation of their Security
Ratings with its in-depth External Attack Surface Management (EASM) and Digital
Risk Protection capabilities at threatngsecurity.com/security-ratings.

About ThreatNG Security

ThreatNG Security is redefining external attack surface management (EASM),
digital risk protection, and security ratings with a platform of unmatched
breadth, depth, and capabilities in managing technical and business threats
across the dark, deep, and open web. Living up to the company mantra (“Security
Centric; Not Exclusive”), ThreatNG provides a configurable solution to target,
discover, and assess digital assets across a definable ecosystem of
organizations, subsidiaries, partners, third parties, supply chains, and
customers. Bolstered and maintained by the open source intelligence (OSINT)
experts at DarcSight Labs, ThreatNG empowers organizations of all types and
sizes to uncover, understand, and manage their external digital threats.


CONTACTS

Erin Price
Email: erin@threatngsecurity.com


THREATNG


RELEASE SUMMARY

ThreatNG Introduces Security and Cybersecurity Ratings Supported by External
Attack Surface Management and Digital Risk Protection Intelligence.


#HASHTAGS

 * #BEC
 * #SubdomainTakeover
 * #CyberRisk
 * #ExternalAttackSurfaceManagement
 * #DataLeak
 * #EASM
 * #BrandDamage
 * #ASM
 * #AttackSurfaceManagement
 * #ExposureManagement
 * #ThreatIntelligence
 * #CyberSecurityRiskRatings
 * #Ransomware
 * #ThirdPartyRiskManagement
 * #Breach
 * #SupplyChainSecurity
 * #WebAppSecurity
 * #ESG
 * #Phishing
 * #SupplyChainRisks
 * #DigitalRiskProtection
 * #SecurityRatings


SOCIAL MEDIA PROFILES

 * threatng
 * threatngsecurity
 * ThreatNG Security YouTube Channel
 * threatngsecurity




MORE NEWS

 * November 08, 2023
   ThreatNG Security Introduces “Two-Way Tuesdays,” an Interactive Branded
   Content Campaign Inspired by the True Stories of Technology and Cybersecurity
   Professionals
 * February 28, 2023
   ThreatNG Security Offers Free Access to Their Groundbreaking Security
   Platform for Organizations to Assess Cloud and SaaS Vulnerabilities


CONTACTS

Erin Price
Email: erin@threatngsecurity.com




SITE NAVIGATION

 * Home
   * Home
   * Submit a Press Release
 * Services
 * News
   * All News
   * News with Multimedia
   * News by Industry
   * News by Subject
   * News by Language
   * Tradeshows & Events
 * Education
   * Overview
   * Blog
   * Distribution & Media
   * Media & Journalist Tools
   * Sample Press Release
   * Find Your News Online
   * Disclosure Resources
 * About Us
   * Overview
   * Become a Member
   * Contact Us
   * Careers
   * Business Wire Newsroom
   * Business Wire Events


SEARCH


SEARCH OPTIONS

 * Search All
 * Search News
 * Search Site
 * Advanced News Search

Advanced News Search
 * Log In
 * Sign Up


FOLLOW US

 * Twitter
 * LinkedIn


MORE FROM BUSINESS WIRE

 * Blog
 * UK/Ireland
 * Deutschland
 * France
 * Hong Kong
 * Italy
 * Japan
 * Tradeshownews.com


BUSINESS WIRE INFORMATION

 * Contact Us
 * UK Tax Strategy
 * Privacy Statement
 * Manage Cookies
 * Terms of Use
 * © 2023 Business Wire

Internet Explorer presents a security risk. To ensure the most secure and best
overall experience on our website we recommend the latest versions of Chrome,
Edge, Firefox, or Safari. Internet Explorer will not be supported as of August
17, 2021. Internet Explorer is no longer supported. To ensure the most secure
and best overall experience on our website, we recommend the latest versions of
Chrome, Edge, Firefox, or Safari.


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer. More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎

SOCIAL MEDIA COOKIES

Social Media Cookies

These cookies are set by a range of social media services that we have added to
the site to enable you to share our content with your friends and networks. They
are capable of tracking your browser across other sites and building up a
profile of your interests. This may impact the content and messages you see on
other websites you visit. If you do not allow these cookies you may not be able
to use or see these sharing tools.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES

Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed


 * 33ACROSS
   
   HOST DESCRIPTION
   
   VIEW COOKIES
   
   
   REPLACE-WITH-DYANMIC-HOST-ID
    * Name
      cookie name


 * 33ACROSS
   
   View Privacy Notice
   
   3 Purposes
   
   REPLACE-WITH-DYANMIC-VENDOR-ID
   Arrow
   
   Consent Purposes
   
   Location Based Ads
   
   Consent Allowed
   
   Legitimate Interest Purposes
   
   Personalize
   
   Require Opt-Out
   
   Special Purposes
   
   Location Based Ads
   
   Features
   
   Location Based Ads
   
   Special Features
   
   Location Based Ads

Confirm My Choices


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Policy

Cookies Settings Accept All Cookies

 * Share
 * Share
 * Tweet
 * Mail
 * Share
 * Copy
 * Share